Search This Blog

Wednesday, May 19, 2010

USB worm named biggest PC threat

Study: P2P networks a treasure trove of health care data | New tool exposes cloud security holes

Network World Security

Forward this to a Friend >>>


USB worm named biggest PC threat
A worm which is spread via USB flash drives has been named the biggest security threat to PC users by McAfee. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

Study: P2P networks a treasure trove of health care data
Nearly eight months after new rules were enacted requiring stronger protection of health care information, organizations are still leaking such data on file-sharing networks, a study by Dartmouth College's Tuck School of Business has found. Read More

New tool exposes cloud security holes
Fortify Software has come up with a way for companies interested in moving their applications to a cloud provider can analyse it line by line for security-worthiness in the new environment. Read More

FTC asked to investigate Google Wi-Fi 'snooping'
A consumer group has called on the U.S. Federal Trade Commission to investigate Google after the search company revealed that it had been collecting people's Internet communications from open wireless networks. Read More


WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

VoIP: Coppin State Solves Its 911 Dilemma
Dr. Ahmed El-Haggan, CIO of Coppin State University, used a networking tool to provide 911 dispatchers the location information they need when VoIP users call with emergencies. Read More

EFF: Forget cookies, your browser has fingerprints
Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation. Read More

CA World: UK focus on governance 'strong'
A focus on standards, such as ISO certification, is still a strong trend in the UK, according to CA Technologies. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Skype worm no cause for panic, says expert
Security research firm Bkis earlier this month warned of a vicious virus targeting both Skype and Yahoo! Messenger. BKIS said in a blog post the attack involved inserting malicious URLs into chat windows with sophisticated social engineering hooks. Read More

Passwords, scams, and you
Reader Deb Ward is the victim of an increasingly common scam. She writes: Read More

One source for most phishing attacks in second half of '09
One electronic crime syndicate using highly developed malware was to be blamed for two-thirds of the phishing attacks discovered in the second half of 2009, according to the Anti-Phishing Working Group (APWG). Read More

Survey: Gov't agencies use unsafe methods to transfer files
Employees at many U.S. government agencies are using insecure methods, including personal e-mail accounts, to transfer large files, often in violation of agency policy, according to a survey released recently. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  2. Dear Steve Jobs: Your iPad isn't 'revolutionary'
  3. Juniper collapses the data center
  4. EFF: Forget cookies, your browser has fingerprints
  5. Facebook users warned of sexy 'Candid camera prank' attack
  6. Comcast signs first IPv6 corporate customer
  7. Car hackers can kill brakes, engine and more
  8. Study: P2P networks a treasure trove of healthcare data
  9. Google stops sniffing Wi-Fi data after privacy gaffe
  10. Steve Jobs 2 a.m. e-mails: Apple motives pure, hits out at Adobe

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: